Why Move Cybersecurity From Compliance-based Risk to Risk-based Compliance?
Bill Frank
Helping CISOs and security teams prioritize control investments using risk analysis. Co-inventor of the patented Cyber Defense Graph?.
Cyber risk is business risk. The Allianz Group one of the world's largest insurance and asset management companies in the world, published their annual Risk Barometer in January, 2023. Cyber Incidents was the most important global business risk. Here is a quote from page 6 of the report:
Unsurprisingly, given the current ‘permacrisis’, business interruption and supply chain disruption ranks as the second top risk in this year’s Allianz Risk Barometer (34%). It is second only to cyber incidents (by just a few votes, also on 34%), whose top position reflects the importance of today’s digital economy, the evolving threat from ransomware and extortion, as well as geopolitical rivalries and conflicts increasingly being played out in cyber space. Cyber risk and business interruption (BI) are closely linked, with cyber also ranking as the cause of BI companies fear most.
Compliance-based cyber risk management is our term for a “risk management” process that’s adequate for ISO 27001 certification and SOC 2 accreditation but does not help security teams prioritize control investments or enable business leaders to manage cyber-related business risks. CISOs and their security teams treat it as a checkbox process.
These frameworks and others including the NIST Cybersecurity Framework are often used to drive cybersecurity programs. However, they do not provide guidance to CISOs who must collaborate with business leaders to set strategy and budgets for the organizations’ cybersecurity programs.
Nor do these frameworks help CISOs and security architects prioritize control investments for a defense-in-depth architecture customized to their organizations’ specific business goals and culture.
Lists of controls do not address the complex interaction of attack surfaces and attack paths, threats, and controls. The efficacy of a control when evaluated in isolation does not necessarily reflect its risk reduction value when deployed in concert with dozens of other controls. Most critical is the inability to tie control efficacy to business risk reduction in dollars.
Compliance frameworks depend on risk registers as proof of a risk analysis process. The risk for each item in the risk register is typically calculated by multiplying a number (1-5) for likelihood by another number (1-5) for impact. The results are color-coded (red-amber-green) in a 5x5 matrix.
There are several problems with this approach:?
Risk-based compliance management is our term for a process that treats cyber risk as a strategic business risk. It starts with identifying the loss events of concern to business leaders because business leaders set cybersecurity budgets and manage strategic business risks.
Instead of being just a component of a compliance framework, risk management becomes the overarching driver of the cybersecurity program. This aligns security teams with business leaders who focus on protecting revenue-generating business processes, critical assets, capital, and cash flow.
The lists of requirements in compliance frameworks are the “what we need to do” activities of cybersecurity. But a risk-based approach is needed to address the “how to implement” trade-offs that must be made due to limited budgets and resources.
Cyber risk and risk reduction investments that are communicated to business leaders in financial terms enable them to include cyber risk in their overall risk management budget allocation process.
Business leaders need to know:
Business leaders are responsible for deciding how much cyber-related business risk they take on, the amount of capital reserves they will maintain, how much cyber insurance will be purchased, and the cybersecurity budget.
CISOs must provide sufficient information to enable business leaders to make informed decisions. This means connecting the technical metrics of cyber controls to business risk in dollars. This is difficult due to the complex interaction among controls, threats, attack surfaces, and attack paths into and through an organization.
Organizations deploy dozens of controls. MITRE ATT&CK? defines hundreds of threat types. And there are thousands of interleaved and overlapping paths into and through an organization that an attacker can traverse.
Monaco Risk provides a quantitative risk management process and software that models this complexity to support the security team’s efforts to collaborate with business leaders.?
Monaco Risk's Cyber Risk Process
Monaco Risk cyber risk quantification approach is used in two ways – strategically for prioritizing major control investment projects and tactically for day-to-day decisions typically involving exceptions to policies like postponing a patch or onboarding a non-conforming vendor.?
领英推荐
Our initial project with a client is typically strategic, and has three key tasks:
1. Define the loss events of concern to business leadership
Loss events include the revenue generating business process, critical assets/data, and related costs. An example for a manufacturer might be disruption of a manufacturing process via ransomware that stops the production of a product. For a retailer it could be disruption of the order-taking process that pushes customers to seek an alternative retailer.
We start with loss events of concern to business leaders for four reasons:
2. Baseline current cyber posture
Our Cyber Defense Graph? statistical simulation software enables us to capture the complex interaction of threats of different capabilities, overlapping attack paths, and controls deployed at different levels of efficacy and coverage.?
Traditional risk management decision-support tools like matrices, decision trees, attack trees, and bowtie diagrams do not adequately support the complexity of cybersecurity – dozens of controls, hundreds of threat types (as defined by MITRE ATT&CK?, and thousands of interleaved attack paths into and through an organization.
3. Evaluate alternative risk mitigation investments
During the baselining step, a set of proposed control improvements are surfaced. We define “what-if” scenarios representing alternative control investments individually or in combination. Our software generates visualizations that display these alternatives compared against the baseline in dollars.
Connecting control efficacy to risk reduction in dollars enables CISOs to collaborate with business leaders in the terms they are familiar with.?
Quantifying and Visualizing cyber-related business risk
Baseline risk and impact of control improvement scenarios are shown in quantitative visual terms using two key methods - Loss Exceedance Curves and ROI.
Loss Exceedance Curves (LECs) are used to forecast the range of probabilities of dollar losses of cyber incidents that can happen in the future. This visualization exposes the true nature of rare but high-impact incidents to decision-makers. This is not unlike the way AccuWeather forecasts snowstorm accumulations. Here is a link for more information on Loss Exceedance Curves: https://www.dhirubhai.net/pulse/cybersecurity-risk-management-transformed-bill-frank/
LECs show the effect of the various what-if scenarios compared with the baseline risk, in probabilistic dollar terms. They help CISOs collaborate with business leaders to come to a mutual agreement on risk appetite, set cybersecurity budgets, and determine the amount of cyber insurance and capital reserves needed.
Return on Investment (ROI) shows the impact of the alternative what-if scenarios, taking into consideration the acquisition, implementation, and maintenance costs of controls as well as risk reduction.
To summarize, moving from compliance-based risk management to risk-based compliance management enables CISOs to collaborate with business leaders on cyber-related business risks and improves budget allocation.
Compliance mandates are satisfied in ways that contribute to cybersecurity posture and optimize use of scarce resources.
Business leaders need to understand cyber-related business risks in financial terms, i.e., risk reduction in dollars and ROI, in order to include them with the other strategic risks they manage.
We have seen that our approach result in larger cybersecurity budgets because business leaders are more confident that the money is being well-spent.
Entrepreneur | Founder @SecureFLO | Technologist |Cybersecurity SME| Listener| Investor
1 年Bill, thanks for sharing!
Manager, Enterprise Cybersecurity, CISSP at Amica Insurance
1 年This needs to trickle down to the regulatory and audit firms before we can implement on the front lines!!!
Cyber Risk and Compliance, Senior Manager
1 年??